--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T14:52:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4c0fdc93-dde4-42f4-a2c1-a3b7885aca81"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:52:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:28:21Z" name: builder-dockercfg-58k9s namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4c0fdc93-dde4-42f4-a2c1-a3b7885aca81 resourceVersion: "44407" uid: d627a362-6b30-45a7-a602-75cb4c27cc61 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T14:52:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7412f5db-75eb-4b47-b32d-ff7203b8af77"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:52:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:28:15Z" name: default-dockercfg-jgch7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 7412f5db-75eb-4b47-b32d-ff7203b8af77 resourceVersion: "44170" uid: 90a22818-7f88-4951-bb60-304dc5ae1be0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T14:52:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7aa3c3e2-78de-4ecd-bfd1-efbfc7e99d36"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:52:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:28:21Z" name: deployer-dockercfg-72k6w namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7aa3c3e2-78de-4ecd-bfd1-efbfc7e99d36 resourceVersion: "44384" uid: 91cbba4f-79b1-4021-849a-b56d8354f04a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T14:56:07Z" service.beta.openshift.io/expiry: "2028-04-19T14:56:07Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 059bc63f-3367-4dde-bea7-0476d93fcb89 creationTimestamp: "2026-04-20T14:56:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"059bc63f-3367-4dde-bea7-0476d93fcb89"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T14:56:08Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 059bc63f-3367-4dde-bea7-0476d93fcb89 resourceVersion: "7294" uid: 27224118-8283-4c32-b413-8fdd01061fa8 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-20T14:52:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8073c077-2d8d-49d0-9196-2ada415e5905"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:52:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:28:15Z" name: dns-dockercfg-tr5vz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 8073c077-2d8d-49d0-9196-2ada415e5905 resourceVersion: "44165" uid: 21fe8151-6d50-4f81-99ac-1d1f7b7c1bf2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-20T14:52:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7656e449-3b6c-4323-81ab-f775920acc81"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:52:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:28:15Z" name: node-resolver-dockercfg-mx55k namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 7656e449-3b6c-4323-81ab-f775920acc81 resourceVersion: "44173" uid: 69b161a0-ddb7-4ab4-ba5f-b77bfe8d372c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "45480"